First published: Fri Dec 11 2020(Updated: )
An issue was discovered in Contiki through 3.0. A memory corruption vulnerability exists in the uIP TCP/IP stack component when handling RPL extension headers of IPv6 network packets in rpl_remove_header in net/rpl/rpl-ext-header.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Contiki-os Contiki | <=3.0 | |
Multiple (open source) picoTCP-NG, Version 1.7.0 and prior | ||
Multiple (open source) picoTCP (EOL), Version 1.7.0 and prior | ||
Multiple (open source) FNET, Version 4.6.3 | ||
Multiple (open source) Nut/Net, Version 5.1 and prior |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-13985 is high with a CVSS score of 7.5.
The affected software of CVE-2020-13985 is Contiki OS version up to 3.0.
CVE-2020-13985 is a memory corruption vulnerability in the uIP TCP/IP stack component of Contiki OS.
To fix CVE-2020-13985, it is recommended to update Contiki OS to a version higher than 3.0.
Yes, you can find references for CVE-2020-13985 at the following links: [Link 1](https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01), [Link 2](https://www.kb.cert.org/vuls/id/815128).